The Sencore SMP100 SMP Media Platform (firmware versions V4.2.160, V60.1.4, V60.1.29) is vulnerable to session hijacking due to improper session management on the /UserManagement.html endpoint. Attackers who are on the same network as the victim and have access to the target's logged-in session can access the endpoint and add new users without any authentication. This allows attackers to gain unauthorized access to the system and perform malicious activities.
References
| Link | Resource |
|---|---|
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63226_Sencore_SMP100_Session_Hijacking | Third Party Advisory |
| https://www.sencore.com/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2025-11-18 20:15
Updated : 2026-02-13 16:13
NVD link : CVE-2025-63226
Mitre link : CVE-2025-63226
CVE.ORG link : CVE-2025-63226
JSON object : View
Products Affected
sencore
- decoder-ccv2_firmware
- decoder-ccv2
- en2sdi-2hd_firmware
- smp100_firmware
- en2sdi-2hd
- smp100
CWE
CWE-613
Insufficient Session Expiration
